Category: Security

SIEM and SOC at a COUPLE of GURUS

SIEM and SOC

This month we would like to take some time and highlight our advanced security services, SIEM (Security Incident and Event Monitoring) and SOC (Security Operation Center). As time progresses, more economic sectors and industries will have to adhere to regulatory compliance geared towards protecting data.  PCI-DSS, HIPAA, and CMMC are ...
7 Types of Cyber Security Threats - A Blog image from a COUPLE of GURUS

7 Types of Cyber Security Threats

Did you know that cybercrime is now the number one global threat to businesses? Cybersecurity Ventures forecasts that cybercrime “will cost the world $10.5 trillion annually by 2025.” That's more than the total GDP of France, Italy, or Brazil, and the 3rd world largest after the US and China! So, ...
Phishing Attacks and What to Know

Phishing Attacks – What to Know

Phishing attacks are on the rise and can result in company breaches if not identified properly by users.  The best way to prevent a phishing attack is to know how to identify a potential attack.  We have some telltale ways to identify if an email may be phishing. 6 Ways ...

Small business data breach response checklist

Not all data breaches are sensational, highly-publicized events. In fact, smaller and lower profile companies are frequently targeted by hackers due to their less robust cybersecurity defenses. And breaches are not always caused by cyber attacks: They can be inadvertently caused by careless or poorly trained employees. Regardless of the ...

My IT guy quit, now what?

Receiving a resignation letter from your IT manager can set off the panic alarm – and for good reason. Most organizations rely heavily on their IT people to keep their business secure and operational, and picking up where they left off isn’t easy – especially if you don’t gather the ...

What is a CMMC audit and how to prepare for one

The CMMC (Cybersecurity Maturity Model Certification) is replacing the previous cybersecurity self-assessment process known as DFARS (Defense Federal Acquisition Regulations System), which made businesses contracted to work with the Department of Defense (DoD) responsible for their own compliance. CMMC certification is achieved through external auditing, and failing will result in ...

The Quick Guide to BYOD Security

Bring Your Own Device (BYOD) is a trend that’s growing rapidly across a variety of industries. Learn how BYOD can benefit your business and what you need to do to mitigate the risks and challenges to make it as safe and secure as possible. BYOD: Bring Your Own Device Allowing ...

Cybersecurity Maturity Model Certification (CMMC): What Manufacturers Need to Know

In late 2020, the US Department of Defense is transitioning to a new certification program for all contractors working with Controlled Unclassified Information (CUI). Compliance is mandatory for all manufacturers and will require an assessment from a CMMC third-party assessment organization (C3PAO). The good news is the new certification program ...

How to Use an S2Score to Measure Your Organization’s Security Risk and Build Proof of Compliance

With rising cybercrime rates and increasingly advanced cybercriminals and foreign intelligence, cybersecurity is more important than ever. Your competitors and clients know this, which is why it’s no longer enough to claim your business is proficient in cybersecurity – you need to show proof to back it up. An S2Score (previously ...

Top Tips for a Secure and Productive Remote-Work Environment

With many companies forced into remote working without any preparation, many are struggling to ensure their remote-work environments are secure and productive. Remote work does offer many benefits to companies and their employees, but it creates security and productivity challenges that you don’t have to deal with in an office ...